Computer Science > QUESTIONS & ANSWERS > CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management (All)
CompTIA Cybersecurity Analyst (CySA+) - Module 2: Vulnerability Management All parts of a security policy should be public knowledge. True False -Answer- False What reasons might a company f... orgo scanning a critical system? Too much time Confidentiality Backups already exist Costs too much -Answer- Too much time & Costs too much What is the factor that determines scanning frequency characterized by an accepted amount of risk? Technical Constraints Risk Acceptance Risk Appetite Regulatory Requirements -Answer- Risk Appetite An assessment scan is used to discover assets. True False -Answer- False What type of test gives the best perspective of an outsider threat? Non-Credentialed Scan Passive Scan Agent-Based Scan Credentialed Scan -Answer- Non-Credentialed Scan What should be considered when prioritizing vulnerabilities to be fixed? Where it is How critical it is Time to fix Which scanner was used -Answer- How critical it is & Time to fix What is a factor considered when categorizing a change to a system? Scope Size Sensitivity Level Risk -Answer- Risk What could inhibit a change from being implemented? Cost Complexity Approval All of the Above -Answer- All of the Above An Agent-Based Scan has a lesser impact on a network vs Sever-based. True False -Answer- True Which scan effects network traffic the least? Non-Credentialed Scan Agent-Based Scan Passive Scan Server-Based Scan -Answer- Passive Scan Which one of these is legally binding? MOU SLA ATWA MTTR -Answer- SLA What determines when a companies security capabilities should grow. Workflow Regulatory Requirements Technical Constraints Risk Appetite -Answer- Workflow Which type of scan uses a copy of the network traffic to find vulnerabilities? Agent-Based Scan Non-Credentialed Scan Passive Scan Server-Based Scan -Answer- Passive Scan The results of vulnerability scans should be shared with the entire company in order to fix vulnerabilities. True False -Answer- True What is it called when a scan misses an existing vulnerability? False Reporting True Negative False Negative False Positive -Answer- False Negative Which has a higher chance of being compromised? Agent-Based Scan SCAP Passive Scan Server-Based Scan -Answer- Agent-Based Scan Which type of scan is most likely to cause major disruption in everyday operations? Agent-Based Scan Non-Credentialed Scan Server-Based Scan Credentialed Scan -Answer- Credentialed Scan What factors help determine the potential frequency of scanning? Technical Constraints Vulnerability Feed Workflow Scope -Answer- Technical Constraints & Workflow After a successful scan it is best to continue running them over time. True False -Answer- True When running a vulnerability scan what determines the number of systems are part of it? Sensitivity Level Technical Constraints Scope SCAP -Answer- Scope What is making sure that a vulnerability scanner is kept up-to-date? Regulatory Requirements Vulnerability Feed SCAP Change Control -Answer- Vulnerability Feed A security policy stays relatively static throughout a companies history. True False -Answer- False What is a projected acceptable amount of downtime that is allowed that can determine if a change can be implemented? Regulatory Requirements MTTR Risk Appetite Availability -Answer- Availability What allows scanners to determine if a system meets a configuration baseline if that scanner is compatible? SCAP SLA Sandboxing CVSS -Answer- SCAP [Show More]
Last updated: 1 year ago
Preview 1 out of 11 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Add to cartInstant download
We Accept:
Connected school, study & course
About the document
Uploaded On
Sep 05, 2022
Number of pages
11
Written in
This document has been written for:
Uploaded
Sep 05, 2022
Downloads
0
Views
196
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·